10 August 2016


Router(config)#router opsf 10
Router(config-router)#network area 0

R1#show ip route 
R1#show ip route ospf 

R1#show ip ospf neighbor
R1#show ip ospf route
R1#show ip ospf database
R1#show ip ospf interface

Router(config)#router opsf 10Enable OSPF routing protocol under process ID 10.
Router(config-router)#network area 0
Enable OSPF with area 0 on matching interface.

Router#show ip routeDisplay all routes from routing table
Router#show ip route ospfDisplay all routers learned through OSPF from routing table

Router#show ip ospf Display basic information about OSPF
Router#show ip ospf interfaceDisplay information about all OSPF active interfaces
Router#show ip ospf neighbor [detail]
Router#show ip ospf databaseOSPF neighbors with basic info
Router#show ip ospf interfacefsdf

ref: http://www.computernetworkingnotes.com/ccna-study-guide/ospf-configuration-step-by-step-guide.html

02 August 2016

Proksi web

The leading proxies are Burp and Zap. Burp pro edition just about has the edge on Zap, but Zap is completely free. The free edition of Burp is usable, but lacks advanced features like the active scanner.
Paros and Webscarab were once leading proxies, but they are no longer cutting edge. Zap is actually a fork of Paros, but it has moved on a lot.
Squid is a proxy, that's true, but it's not an interactive proxy. It's not much help for testing a web app.

ref: http://security.stackexchange.com/questions/53557/which-opensource-proxy-is-better-and-easier-to-use  (march 2014)

05 July 2016

setup permulaan router Cisco IOS

List nic
  • show interfaces description
Gi0/0                          up             up
Gi0/1                          admin down     down
Gi0/2                          admin down     down
Lo0                            up             up

Configure vIOS routers as following.
Router#conf t
Router(config)#hostname vOS-I
vIOS-I(config)#interface GigabitEthernet 0/0
vIOS-I(config-if)#ip address
vIOS-I(config-if)#no shutdown
vIOS-I(config-if)#do wr

List Routing Table
Router2#show ip route

Default GW
Router(config)#ip route

Enable SSh @ router

Router (config)# username admin privilege 15 secret Firewall.cx      (Firewall.cx <- nbsp="" password="" ssh="" strong="" to="">
Router (config)# aaa new-model
Router (config)# aaa authentication login default local
Router (config)# enable secret $FirewAll.cx!           <- en="" mode="" nbsp="" password="" strong="" to="">
Router (config)# service password-encryption

R1(config)# line vty 0 4
R1(config-line)# transport input ssh
R1(config-line)# login authentication default
R1(config-line)# password $Cisco!    <- aaa="" authentication="" cisco="" guna="" nbsp="" ni="" pakai="" password="" sebab="" strong="" tak="">

Generating RSA key  (selagi takde key, ssh port tak enable)
R1 (config)#  ip domain-name firewall.cx
R1(config)# crypto key generate rsa 
The name for the keys will be: R1.firewall.cx
Choose the size of the key modulus in the range of 360 to 4096 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes.                                                                                                                                                                                                     How many bits in the modulus [512]: 4096
% Generating 4096 bit RSA keys, keys will be non-exportable...
[OK] (elapsed time was 183 seconds)


Remove ospf process:
R1(conf)#  no router ospf 1

09 June 2016

git branch

ref:  https://git-scm.com/book/en/v2/Git-Branching-Branches-in-a-Nutshell

06 May 2016

Python virtual environment

mkvirtualenv [-a project_path] [-i package] [-r requirements_file] [virtualenv options] ENVNAME
lsvirtualenv [-b] [-l] [-h]

showvirtualenv [env]

rmvirtualenv ENVNAME

workon [(-c|--cd)|(-n|--no-cd)] [environment_name|"."]



ref: http://virtualenvwrapper.readthedocs.io/en/latest/command_ref.html

04 April 2016

Domain Shadowing

In an attack that includes domain shadowing, an attacker will log into the domain register's website to set up a new subdomain registered to a new server IP address. By registering many subdomain names and IP addresses, attackers are able to avoid blacklists, but it does not allow attackers to bypass reputation-based filters.


angler Exploit Kit

reading for non technical